Another unfortunate case of a ransomware attack on a municipality. Read more here and how they may end up paying the ransom.
Restoring documents is something that is rarely planned. Check out the 3 questions a document restoration company should be asking here.
The conference agenda is located here
Featured Speakers: John Montaña, J.D., FIIM, FAI, VP of IG at Access and Brenda Barnhill, JD, LL.M. Director & Consulting Specialist at Montaña & Associates, an Access Company The mergers...
The 2019 version of RSA Conference in San Francisco has come and gone. Here are some of the product and session highlights, major themes and excellent resources to dig deeper into myriad cybersecurity and technology topics.
Organizations to collaborate on joint venture to bring the Certificate of Cloud Auditing Knowledge (CCAK) to the market via ISACA
MER Sapient is hosting a webinar with Access as a sponsor. Register now, and learn how you can apply best IG practices to: - Drive higher customer value...
Check out the latest news coming out of ARMA regarding candidates for open board positions.
Thank you for recently attending the Government Technology Webinar entitled "Cybersecurity in an Uncertain World: New Ways to Confront New Ransomware Threats". If you'd like to view the recorded session or pass the link...
The use of art to illustrate and visualize microbes and other medical images may be a new record or archival classification you hadn't considered. Link to blog post is here.
Special thank you to Chuck Sowers, President of DHS Worldwide, and his team for putting this webinar together. Note, this webinar is especially helpful if you are using their Total Recall software. Check out this...
Cisco’s new annual forecast predicts that 71% of global population will be mobile subscribers by 2023
According to career expert site Zippia, librarians who enter the field don't remain stuck in their initial entry-level positions very long.
A piece written by Executive Director of NAID & PRISM, Bob Johnson, shines a light on two people who made a difference in the RIM industry. Check it out here.
Information Security In an Insecure World Wednesday, April 22, 2020, 8:15-4:45 Grant Thornton LLP, 1000 Wilson Boulevard, 15th Floor, Arlington, VA 22209 Jointly presented by the Northern...
by IG GURU - 9/25/2019 Edward Snowden is the notorious former NSA contractor who blew the whistle on a mass surveillance program run by US intelligence officials. Recently, the US government...
SYDNEY (Reuters) - Australia’s competition watchdog on Monday recommended tougher scrutiny and a new regulatory body to check the dominance of tech giants Facebook Inc and Alphabet Inc’s Google in the country’s online advertising and news markets. Source
For those of us in the industry, the concepts of information governance (IG) are not foreign.  We know that IG is dynamic and there are many methodologies and best practices to help us with our programs. Last February, ARMA...
Insurance broker Marsh has unveiled the inaugural class of cybersecurity products and services receiving a Cyber Catalyst designation that is part of an evaluation program its backers hope will bring greater clarity in the crowded cybersecurity marketplace.
In the latest book from well known RIM and IG writer, speaker, and author, Randolph Kahn, he hits home what executives need to know about the information universe. The book also benefits, lawyers, students, IG professionals,...